DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
a7f90dafbff7a229b4047937b0253656eee37cb01b4e0da14d5681a60450aeb8.dll
Resource
win7-20220812-en
Target
a7f90dafbff7a229b4047937b0253656eee37cb01b4e0da14d5681a60450aeb8
Size
201KB
MD5
d59316e9c057566f23a51a684d0455e1
SHA1
9ba07e45ace28681189ae310fcb521fd1eb7fc04
SHA256
a7f90dafbff7a229b4047937b0253656eee37cb01b4e0da14d5681a60450aeb8
SHA512
7e8e95d326a67497190cb4b72b363580e5a6c9febf3ca0c5c3cf0887f58c7f248f96f2b32ddee135c445ef02762f71d5a757e6211111768c7d0dac9d1f2759e3
SSDEEP
3072:ZIZse52aSMqLmE82n5d/r0Ih0/IQXqdLNdZHpEXOhuf721hjdPQF1LQwV6AmKaHX:W6e5Eif2n5d0fANdZSrf+cLCAm/P2dA
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryExW
ResetEvent
CreateEventW
SetEvent
Sleep
CreateThread
GetCurrentThreadId
WaitForSingleObject
MultiByteToWideChar
lstrlenA
lstrlenW
WaitForMultipleObjects
DisableThreadLibraryCalls
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
lstrcmpiA
VirtualProtect
FormatMessageW
LocalAlloc
LocalFree
GetLastError
lstrcpyA
lstrcmpW
GetLocaleInfoW
GetVersionExW
WideCharToMultiByte
lstrcpyW
GetModuleFileNameW
GetComputerNameW
lstrcpynW
FlushInstructionCache
LoadLibraryW
GetCurrentProcess
WriteProcessMemory
VirtualQuery
GetCurrentProcessId
CloseHandle
CreateToolhelp32Snapshot
Module32FirstW
Module32NextW
GetProcAddress
GetModuleHandleA
GetSystemInfo
EnterCriticalSection
StrStrIW
StrChrW
StrStrW
CoUninitialize
CoCreateInstance
CoInitialize
SysAllocString
SafeArrayUnaccessData
SysAllocStringLen
SafeArrayAccessData
DispCallFunc
LoadRegTypeLi
SysStringLen
VariantClear
SafeArrayCreateVector
VariantInit
SysFreeString
InternetSetCookieExW
ord58
ord32
ord57
ord18
ord10
ord16
ord21
ord23
ord30
ord15
ord11
ImageDirectoryEntryToData
??0_Lockit@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBD0@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??1_Lockit@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
_except_handler3
__CxxFrameHandler
??2@YAPAXI@Z
time
strlen
_CxxThrowException
memcpy
_purecall
memcmp
memset
printf
strtol
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
??0exception@@QAE@ABQBD@Z
strchr
free
__dllonexit
_onexit
??1type_info@@UAE@XZ
_adjust_fdiv
?terminate@@YAXXZ
_initterm
malloc
wsprintfW
wsprintfA
StrToIntW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ